SYSTEM_THREAD_EXCEPTION_NOT_HANDLED_M (1000007e)
This is a very common bugcheck. Usually the exception address pinpoints
the driver/function that caused the problem. Always note this address
as well as the link date of the driver/image that contains this address.
Some common problems are exception code 0x80000003. This means a hard
coded breakpoint or assertion was hit, but this system was booted
/NODEBUG. This is not supposed to happen as developers should never have
hardcoded breakpoints in retail code, but ...
If this happens, make sure a debugger gets connected, and the
system is booted /DEBUG. This will let us see why this breakpoint is
happening.
Arguments:
Arg1: ffffffffc0000005, The exception code that was not handled
Arg2: fffff8011ce8a825, The address that the exception occurred at
Arg3: ffffd00023445e58, Exception Record Address
Arg4: ffffd00023445670, Context Record Address
Debugging Details:
------------------
fffff8038e11ce58: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff8038e1d9308
KEY_VALUES_STRING: 1
Key : AV.Fault
Value: Read
Key : Analysis.CPU.mSec
Value: 3827
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 14806
Key : Analysis.Memory.CommitPeak.Mb
Value: 68
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: winblue_ltsb_escrow
Key : WER.OS.Timestamp
Value: 2020-08-14T18:23:00Z
Key : WER.OS.Version
Value: 8.1.9600.19812
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 7e
BUGCHECK_P1: ffffffffc0000005
BUGCHECK_P2: fffff8011ce8a825
BUGCHECK_P3: ffffd00023445e58
BUGCHECK_P4: ffffd00023445670
EXCEPTION_RECORD: ffffd00023445e58 -- (.exr 0xffffd00023445e58)
ExceptionAddress: fffff8011ce8a825 (igdkmd64+0x000000000006b825)
ExceptionCode: c0000005 (Access violation)
ExceptionFlags: 00000000
NumberParameters: 2
Parameter[0]: 0000000000000000
Parameter[1]: 000000c024848bb0
Attempt to read from address 000000c024848bb0
CONTEXT: ffffd00023445670 -- (.cxr 0xffffd00023445670)
rax=0000000013400000 rbx=ffffe001680ede00 rcx=000000c024848b48
rdx=0000000000000004 rsi=ffffe00166c00000 rdi=ffffe001679cdb20
rip=fffff8011ce8a825 rsp=ffffd00023446098 rbp=0000000013400000
r8=0000000013400000 r9=000000002bfe4011 r10=0000000000000001
r11=0000000000000000 r12=ffffe0016803b3c0 r13=ffffe00167b98580
r14=0000000000000004 r15=0000000000000001
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0000 ds=002b es=002b fs=0053 gs=002b efl=00010206
igdkmd64+0x6b825:
fffff801`1ce8a825 8b4168 mov eax,dword ptr [rcx+68h] ds:002b:000000c0`24848bb0=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: System
READ_ADDRESS: fffff8038e11ce58: Unable to get Flags value from nt!KdVersionBlock
fffff8038e11ce58: Unable to get Flags value from nt!KdVersionBlock
fffff8038e11ce58: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff8038e1d92a8
GetUlongPtrFromAddress: unable to read from fffff8038e1d9530
fffff8038e11ce58: Unable to get Flags value from nt!KdVersionBlock
000000c024848bb0
ERROR_CODE: (NTSTATUS) 0xc0000005 - 0x%p adresindeki y nerge 0x%p adresindeki belle e ba vurdu. Bellek u olamaz %s.
EXCEPTION_CODE_STR: c0000005
EXCEPTION_PARAMETER1: 0000000000000000
EXCEPTION_PARAMETER2: 000000c024848bb0
EXCEPTION_STR: 0xc0000005
STACK_TEXT:
ffffd000`23446098 fffff801`1ce3f578 : ffffe001`66c00000 00000000`00000004 ffffe001`67b98580 ffffd000`23446250 : igdkmd64+0x6b825
ffffd000`234460a0 ffffe001`66c00000 : 00000000`00000004 ffffe001`67b98580 ffffd000`23446250 ffffd000`23446250 : igdkmd64+0x20578
ffffd000`234460a8 00000000`00000004 : ffffe001`67b98580 ffffd000`23446250 ffffd000`23446250 fffff801`1cf5c896 : 0xffffe001`66c00000
ffffd000`234460b0 ffffe001`67b98580 : ffffd000`23446250 ffffd000`23446250 fffff801`1cf5c896 ffffe001`679f3e40 : 0x4
ffffd000`234460b8 ffffd000`23446250 : ffffd000`23446250 fffff801`1cf5c896 ffffe001`679f3e40 ffffe001`66c00000 : 0xffffe001`67b98580
ffffd000`234460c0 ffffd000`23446250 : fffff801`1cf5c896 ffffe001`679f3e40 ffffe001`66c00000 00000000`00000000 : 0xffffd000`23446250
ffffd000`234460c8 fffff801`1cf5c896 : ffffe001`679f3e40 ffffe001`66c00000 00000000`00000000 00000000`00000000 : 0xffffd000`23446250
ffffd000`234460d0 ffffe001`679f3e40 : ffffe001`66c00000 00000000`00000000 00000000`00000000 ffffd000`23446250 : igdkmd64+0x13d896
ffffd000`234460d8 ffffe001`66c00000 : 00000000`00000000 00000000`00000000 ffffd000`23446250 fffff801`1ce30172 : 0xffffe001`679f3e40
ffffd000`234460e0 00000000`00000000 : 00000000`00000000 ffffd000`23446250 fffff801`1ce30172 ffffe001`66c00000 : 0xffffe001`66c00000
SYMBOL_NAME: igdkmd64+6b825
MODULE_NAME: igdkmd64
IMAGE_NAME: igdkmd64.sys
STACK_COMMAND: .cxr 0xffffd00023445670 ; kb
BUCKET_ID_FUNC_OFFSET: 6b825
FAILURE_BUCKET_ID: AV_igdkmd64!unknown_function
OS_VERSION: 8.1.9600.19812
BUILDLAB_STR: winblue_ltsb_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {ae6ed5da-86a4-a1ba-84df-0618cafaf7fa}
Followup: MachineOwner
---------
SYSTEM_SERVICE_EXCEPTION (3b)
An exception happened while executing a system service routine.
Arguments:
Arg1: 00000000c0000005, Exception code that caused the bugcheck
Arg2: fffff800e9b20df2, Address of the instruction which caused the bugcheck
Arg3: ffffd001ce533600, Address of the context record for the exception that caused the bugcheck
Arg4: 0000000000000000, zero.
Debugging Details:
------------------
fffff802ec31ee58: Unable to get Flags value from nt!KdVersionBlock
GetUlongPtrFromAddress: unable to read from fffff802ec3db308
KEY_VALUES_STRING: 1
Key : Analysis.CPU.mSec
Value: 3234
Key : Analysis.DebugAnalysisProvider.CPP
Value: Create: 8007007e on BORA
Key : Analysis.DebugData
Value: CreateObject
Key : Analysis.DebugModel
Value: CreateObject
Key : Analysis.Elapsed.mSec
Value: 18589
Key : Analysis.Memory.CommitPeak.Mb
Value: 70
Key : Analysis.System
Value: CreateObject
Key : WER.OS.Branch
Value: winblue_ltsb_escrow
Key : WER.OS.Timestamp
Value: 2020-05-19T19:14:00Z
Key : WER.OS.Version
Value: 8.1.9600.19724
ADDITIONAL_XML: 1
OS_BUILD_LAYERS: 1
BUGCHECK_CODE: 3b
BUGCHECK_P1: c0000005
BUGCHECK_P2: fffff800e9b20df2
BUGCHECK_P3: ffffd001ce533600
BUGCHECK_P4: 0
CONTEXT: ffffd001ce533600 -- (.cxr 0xffffd001ce533600)
rax=ffffd001ce534460 rbx=ffffd001ce534a00 rcx=0000000000000000
rdx=0000000000000000 rsi=0000000000000000 rdi=ffffe001d54391c0
rip=fffff800e9b20df2 rsp=ffffd001ce534020 rbp=ffffd001ce534120
r8=0000000000000000 r9=0000000000000001 r10=ffffe001d60eccd0
r11=0000000000000000 r12=ffffd001ce5341c0 r13=ffffc0019d2246e0
r14=ffffe001d51a7a40 r15=0000000000000000
iopl=0 nv up ei pl nz na po nc
cs=0010 ss=0018 ds=002b es=002b fs=0053 gs=002b efl=00010206
atikmpag+0xcdf2:
fffff800`e9b20df2 45399888000000 cmp dword ptr [r8+88h],r11d ds:002b:00000000`00000088=????????
Resetting default scope
CUSTOMER_CRASH_COUNT: 1
PROCESS_NAME: SwordWithSauce
STACK_TEXT:
ffffd001`ce534020 ffffe001`d7656000 : 000000da`198e0000 00000000`08000008 ffffe001`00000000 00000000`00001001 : atikmpag+0xcdf2
ffffd001`ce534028 000000da`198e0000 : 00000000`08000008 ffffe001`00000000 00000000`00001001 ffffc001`ac846a10 : 0xffffe001`d7656000
ffffd001`ce534030 00000000`08000008 : ffffe001`00000000 00000000`00001001 ffffc001`ac846a10 00000000`00000001 : 0x000000da`198e0000
ffffd001`ce534038 ffffe001`00000000 : 00000000`00001001 ffffc001`ac846a10 00000000`00000001 ffffc001`9d2246e0 : 0x8000008
ffffd001`ce534040 00000000`00001001 : ffffc001`ac846a10 00000000`00000001 ffffc001`9d2246e0 00000001`00000000 : 0xffffe001`00000000
ffffd001`ce534048 ffffc001`ac846a10 : 00000000`00000001 ffffc001`9d2246e0 00000001`00000000 ffffd001`ce534460 : 0x1001
ffffd001`ce534050 00000000`00000001 : ffffc001`9d2246e0 00000001`00000000 ffffd001`ce534460 00000000`00000000 : 0xffffc001`ac846a10
ffffd001`ce534058 ffffc001`9d2246e0 : 00000001`00000000 ffffd001`ce534460 00000000`00000000 ffffd001`00000000 : 0x1
ffffd001`ce534060 00000001`00000000 : ffffd001`ce534460 00000000`00000000 ffffd001`00000000 fffff800`00000000 : 0xffffc001`9d2246e0
ffffd001`ce534068 ffffd001`ce534460 : 00000000`00000000 ffffd001`00000000 fffff800`00000000 fffff802`ec023164 : 0x00000001`00000000
ffffd001`ce534070 00000000`00000000 : ffffd001`00000000 fffff800`00000000 fffff802`ec023164 00000040`ffffffff : 0xffffd001`ce534460
SYMBOL_NAME: atikmpag+cdf2
MODULE_NAME: atikmpag
IMAGE_NAME: atikmpag.sys
STACK_COMMAND: .cxr 0xffffd001ce533600 ; kb
BUCKET_ID_FUNC_OFFSET: cdf2
FAILURE_BUCKET_ID: 0x3B_c0000005_atikmpag!unknown_function
OS_VERSION: 8.1.9600.19724
BUILDLAB_STR: winblue_ltsb_escrow
OSPLATFORM_TYPE: x64
OSNAME: Windows 8.1
FAILURE_ID_HASH: {89cde08b-30ee-78ac-bffb-f5a78e9a675a}
Followup: MachineOwner
---------
Windows'u güvenli modda açabiliyorsan minidump dosyalarını paylaş.
Minidump Dosyalarını Paylaşın
Minidump dosyaları, bilgisayarınız mavi ekran verdiğinde belleğin ufak bir dökümünü barındıran dosyalardır. Bunları analiz ederek mavi ekran hatalarının nedenini öğrenebiliriz. Minidump dosyaları C:\Windows\Minidump klasöründe bulunur ve DMP uzantılıdır. Bu dosyaları sizden istediğimizde...www.technopat.net
Sorun gider > gelişmiş seçenekler > başlangıç ayarları > yeniden başlat ve sonra liste gelecek, oradan "güvenli modu etkinleştir"in rakamını tuşla.
"Yeniden Başlat"a tıkla, bilgisayar açılırken sana soracaktır hangisini yapmak istediğini. Oradan da güvenli modu seçersin.Suanda buradayiz yeniden baslata basalimmi yeeniden baslata bastiginda hepsi etkinlesecek secme yapamiyoruz.
Windows'u güvenli modda açabiliyorsan minidump dosyalarını paylaş.
Minidump Dosyalarını Paylaşın
Minidump dosyaları, bilgisayarınız mavi ekran verdiğinde belleğin ufak bir dökümünü barındıran dosyalardır. Bunları analiz ederek mavi ekran hatalarının nedenini öğrenebiliriz. Minidump dosyaları C:\Windows\Minidump klasöründe bulunur ve DMP uzantılıdır. Bu dosyaları sizden istediğimizde...www.technopat.net
Bu sitenin çalışmasını sağlamak için gerekli çerezleri ve deneyiminizi iyileştirmek için isteğe bağlı çerezleri kullanıyoruz.